Ivon is an encrypted shellcode generator. It uses 32bits key to perform a XOR. Polymorphic shellcode are very easy to create. They are very useful to pass through IDS for remote exploits. There is only 26 constant bytes in the encrypted shellcode.
47f81f5477410909b6009700938be83609ce631f0b5f9d35856dfe25b7f9393d
Wpoison (May 28 snapshot) is a tool which attempts to find any SQL-injection vulnerabilities on a remote web document, finding bugs in dynamic content such as php and asp. Readme available here.
225c08e936991cd9c386f8f8ebfa69f04ab4771646447ca275873eff8de20127
CERT Quarterly Summary CS-2002-02 - Recent attack trends include exploitation of vulnerabilities in Microsoft SQL Server, Buffer Overflow in Microsoft's MSN Chat ActiveX Control, Heap Overflow in Cachefs Daemon (cachefsd), IIS, Oracle, and more.
efde773bb7f56efc13cc4392691a982f51eb2484cc804e6e711e96318a3be282
3CDaemon FTP Server v2.0 buffer overflow dos exploit.
d0bb8165e0bcac7204de3d63e1564b55afe72a5111b6aed167cf88b2697764d8
IIS 5.0 .asp buffer overrun remote exploit which runs cmd.exe. The .asp overflow is documented in ms02-018.
666b2cf056c8a68d889f9a532157b8522f2cb61c48f94e39001224f4a29e815a
Imap4 prior to v2001a remote exploit for Linux. Requires user account, includes offsets for Slackware 7.1 and Redhat 7.2.
e3d4caaea2b25eed9bb16c6915f9acac7dcca8886f577518fc678d5f31d4874a
Trojodaemon is a simple tool which allows you to start a process at boot.
b1fcc4788983fd70ebc08005a5413768ba7bc47799379e6b828fa0c31c48f9eb
WarFTPd v1.65 for Win2k remote buffer overflow exploit in win32 perl. Included shellcode pops up a message box.
4d51ac1438509a6db6d42e889b5f2204a336e230d13d61319f50f9395026bad2